article thumbnail

No, The Chinese Have Not Broken Modern Encryption Systems with a Quantum Computer

Schneier on Security

The headline is pretty scary: “ China’s Quantum Computer Scientists Crack Military-Grade Encryption.” It all seems to have come from this news article , which wasn’t bad but was taken widely out of proportion. ” No, it’s not true. This debunking saved me the trouble of writing one.

article thumbnail

Samsung Encryption Flaw

Schneier on Security

Researchers have found a major encryption flaw in 100 million Samsung Galaxy phones. Here are the details: As we discussed in Section 3, the wrapping key used to encrypt the key blobs (HDK) is derived using a salt value computed by the Keymaster TA. GSM needs a new nonce for every encryption. News article.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST Releases First Post-Quantum Encryption Algorithms

Schneier on Security

EDITED TO ADD: Good article : One – ML-KEM [PDF] (based on CRYSTALS-Kyber) – is intended for general encryption, which protects data as it moves across public networks. My recent writings on post-quantum cryptographic standards. NIST plans to select one or two of these algorithms by the end of 2024.

article thumbnail

Microsoft Can Fix Ransomware Tomorrow

Adam Shostack

My latest article at Dark Reading is Microsoft Can Fix Ransomware Tomorrow. Ransomware works by going through files, one by one, and replacing their content with an encrypted version. Because you can't encrypt a file until you can open it, this would have a dramatic impact on ransomware.

article thumbnail

Google Releases Basic Homomorphic Encryption Tool

Schneier on Security

From a Wired article : Private Join and Compute uses a 1970s methodology known as "commutative encryption" to allow data in the data sets to be encrypted with multiple keys, without it mattering which order the keys are used in. Boing Boing article.

article thumbnail

Apple ordered to grant access to users’ encrypted data

Malwarebytes

Last week, an article in the Washington Post revealed the UK had secretly ordered Apple to provide blanket access to protected cloud backups around the world. The UK government has demanded to be able to access encrypted data stored by Apple users worldwide in its cloud service. This feature is called Advanced Data Protection.

article thumbnail

Germany Talking about Banning End-to-End Encryption

Schneier on Security

Der Spiegel is reporting that the German Ministry for Internal Affairs is planning to require all Internet message services to provide plaintext messages on demand, basically outlawing strong end-to-end encryption. Anyone not complying will be blocked, although the article doesn't say how.